O'Reilly logo

Solaris™ 8 Advanced System Administrator's Guide, Third Edition by Janice Winsor

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

New Security Features in the Solaris 2.6 Release

Starting with the Solaris 2.6 release. the following new features are provided to enhance security.

  • The Pluggable Authentication Module (PAM) framework.

  • A noexec_user_stack variable, set in the /etc/system file, which enables you to specify whether stack mappings are executable.

Pluggable Authentication Module (PAM)

PAM enables you to plug in new authentication technologies without changing the login, ftp, or telnet commands. You can also use PAM to integrate UNIX login with other security mechanisms, such as data encryption standard (DES) or Kerberos. You can also use this framework to plug in mechanisms for account, session, and password management. See Chapter 22, “Using Authentication Services,” ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required